Search CVE reports


Toggle filters

41 – 50 of 37863 results

Status is adjusted based on your filters.


CVE-2026-4690

Medium priority
Ignored

Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

firefox, thunderbird, mozjs38, mozjs52, mozjs68...

Package 20.04 LTS
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs91
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4689

Medium priority
Ignored

Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

mozjs91, firefox, thunderbird, mozjs38, mozjs52...

Package 20.04 LTS
mozjs91
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4688

Medium priority
Ignored

Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

firefox, thunderbird, mozjs38, mozjs52, mozjs68...

Package 20.04 LTS
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs91
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4687

Medium priority
Ignored

Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

firefox, thunderbird, mozjs38, mozjs52, mozjs68...

Package 20.04 LTS
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs91
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4686

Medium priority
Ignored

Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

firefox, thunderbird, mozjs38, mozjs52, mozjs68...

Package 20.04 LTS
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs91
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4685

Medium priority
Ignored

Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

firefox, thunderbird, mozjs38, mozjs52, mozjs68...

Package 20.04 LTS
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs91
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4684

Medium priority
Ignored

Race condition, use-after-free in the Graphics: WebRender component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

9 affected packages

firefox, thunderbird, mozjs38, mozjs52, mozjs68...

Package 20.04 LTS
firefox
thunderbird
mozjs38
mozjs52 Ignored
mozjs68 Ignored
mozjs78
mozjs91
mozjs102
mozjs115
Show all 9 packages Show less packages

CVE-2026-4519

Medium priority
Needs evaluation

The webbrowser.open() API would accept leading dashes in the URL which could be handled as command line options for certain web browsers. New behavior rejects leading dashes. Users are recommended to sanitize URLs prior to passing...

14 affected packages

jython, pypy3, python2.7, python3.4, python3.5...

Package 20.04 LTS
jython Needs evaluation
pypy3 Needs evaluation
python2.7 Needs evaluation
python3.4
python3.5
python3.6
python3.7
python3.8 Needs evaluation
python3.9 Needs evaluation
python3.10
python3.11
python3.12
python3.13
python3.14
Show all 14 packages Show less packages

CVE-2026-4438

Medium priority
Needs evaluation

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the...

2 affected packages

glibc, eglibc

Package 20.04 LTS
glibc Needs evaluation
eglibc
Show less packages

CVE-2026-4437

Medium priority
Needs evaluation

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server,...

2 affected packages

glibc, eglibc

Package 20.04 LTS
glibc Needs evaluation
eglibc
Show less packages